16
Methods to improve the effectiveness of the information security management system Financial university under the Government of the Russian Federation Jibek Sharsheeva [email protected] RIPE NCC Regional meeting Almaty 25 September 2018

Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

Methods to improve the effectiveness of the information security management system

Financial university under the Government of the Russian Federation

Jibek Sharsheeva

[email protected]

RIPE NCC Regional meeting Almaty

25 September 2018

Page 2: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

The power of DDoS attacks

In 2015, a record attack was a 500 Gbps attack, and in 2018 the power of attacks exceeded 1.6 Tbit / s already.

2 0

200

400

600

800

1000

1200

1400

1600

Ddos attacs

500

1600

2015 2018

Page 3: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

• In the first half of 2018, an average of 20 attacks per day on the infrastructure of the telecoms operator and its customers were conducted on average each day.

• The average duration of one attack is 21 minutes, the longest attack for the first half of 2018 is 1200 minutes (20 hours), the shortest is 2 minutes

• The average attack power is 3.14 Gb / s. The maximum attack power is 393.6 Gbit / s

3

Page 4: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

• Over the next couple of years the global cost of cyber security will be about $ 1 trillion.

• By 2021 the cost of recovering global damage due to extortion attacks might exceed $ 6 trillion.

• *CyberSecurityVentures

4 .

Page 5: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

All used methods of information security conflict between the state of the theory ensuring information security and modern standards of practice to ensure information security.

5

The increase in the number and scale of attacks.

Page 6: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

• A significant number of developed standards leads to a variety of versions and options for their application to ensure security.

• National standards of GOST R do not have time to be updated synchronously with the revision of international standards (for example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006).

6

Page 7: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

• Almost never used the approach of risk management based on modern risk-based standards, including residual risks accounting procedures

7

Essential general elements in the current methodologies

Page 8: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

Disadvantages

• Despite the more frequent application of risk-oriented foreign standards and methodologies (ISO, IEC, NIST, ISAGO, IEEE, ITIL, COBIT, TOGAF, etc.)

8

Practical lack of a reliable methodical apparatus

•to obtain numerical information security level assessment

Lack of a common universal concept

•related to the phases of the life cycle and risk management, with the general principles of implementing information security mechanisms in management systems (in the PDCA cycle).

Lack of holistic approach

•for complex counteraction to modern threats of information security

Page 9: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

9

Page 10: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

10

Page 11: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

Solutions of leading companies providing secure communication

11

Company A

•Entered the information security market last year by

opening the resources of its own security operation center.

Company B

•Provides for its customers filtering at

the backbone network of the

operator with the best SLA on the

market.

Page 12: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

Недостаток

• Operators can not fully provide protection due to the nature of the network architecture

• Despite the emergence of networks of new generations using a different signaling system, as it should support the old standards and the interaction between networks of different generations. 12

Page 13: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

What can be done?

13

Requires a flexible and simple mathematical apparatus adaptive to dynamically changing requirements in information security management system

Including functions of risk management, joined to the phases of the life cycle and the introduction of appropriate feedback loops would significantly increase the speed of decision-effective management solutions.

Through the use of new models information security management system audit realizing prompt formation quantification level ensuring information security, selection and use of the best set of means to ensure information security risks identified processing efficiency can be improved ensuring information security

Page 14: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

Necessary activities

• “It seems promising to implement jointly the functions of risk management, flexible feedback, the "closure" of the PDCA cycle, a simple and effective mathematical apparatus in the "instant audit" model of information security. In the development of this optimization method is the justification of the ability to withstand modern attacks”-Livshis I.

14

Page 15: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

15

Protection algorithms are in the framework of a large number of random and heavily predictable parameters (the behavior of the attacker, natural disasters, etc.).

20% of all existing security tasks can be solved by technical means

Among all areas of protection, the most part is precisely organizational protection, related to human actions.

80% of all problems are solved through organizational, administrative and procedural means.

Page 16: Methods to improve an effectiveness of information …...example, ISO / IEC 27001: 2013 and GOST R ISO / IEC 27001-2006). 6 • Almost never used the approach of risk management based

Thank you!

Jibek Sharsheeva [email protected]

16